Beware of the GIF: Account Takeover Vulnerability in Microsoft Teams (CyberArk)
Attackers could have used a malicious GIF to scrape user’s data and ultimately take over an organization’s entire roster of Teams accounts.
Cisco and Google Cloud Partner to Bridge Applications and Networks: Announcing Cisco SD-WAN Cloud Hub with Google Cloud
This automated solution will ensure that applications and enterprise networks will be able to share service-level agreement settings, security policy, and compliance data, to provide predictable application performance and consistent user experience.
Veeam Announces General Availability of NEW Veeam Backup for Microsoft Azure
This new offering will enable customers and service providers to move more applications and data to Azure, and to cost-effectively, securely, and easily protect cloud applications and data in Azure.
Nvidia completes ‘homerun deal’ after closing $7 billion acquisition of Mellanox
“We’re combining the leaders of AI computing and high speed networking and data processing into one company and, so, this is really quite extraordinary,” said NVIDIA CEO Jensen Huang.
Apple Confirms New Warning Affecting Almost All iPhone Users
With iOS 12, an attacker requires the iPhone user to open a malicious email. But with iOS 13, it can be triggered unassisted simply from the Mail app being opened in the background.
Citrix TIPs: Deploying work-from-home solutions
From an IT perspective, will the solution we have in place to address our short-term needs be viable long term? Or do we need to re-evaluate and redesign our solutions to support permanent remote work capabilities?
Security is (Still) Everyone's Responsibility (F5 Networks)
The reality is you cannot prevent any attack. You have no control over the actions of bad actors. But you can take steps to prevent a successful attack.
WEBINAR: Validating Your Remote Infrastructure at Scale with Login VSI
3 Myths About Security in the Cloud (Palo Alto Networks)
In order to reap all the business benefits cloud has to offer, we must ensure that myths are dispelled with both facts and action.
Data Strategy Framework for Uncertain Economic Times (Pure Storage)
Pure Storage technologies overcome data gravity and significantly increase data portability. Pure’s best-in-class data-reduction technology means you have less data to move when migrating from core data centres to the cloud.
NetApp scoops up virtual desktop company CloudJumper
NetApp plans to use the acquisition to bolster its desktop virtualization capabilities. NetApp's new Virtual Desktop Service (VDS) service will integrate CloudJumper's VDI and RDS technology and expand NetApp's offerings for deploying and managing virtual desktops in public clouds.
Security Without Barriers, Part One: A New Cyber Security Narrative (FireEye)
Because of this unbalanced threat landscape, many security leaders have adopted cyber resilience strategies. They balance investments that protect against attacks with other investments that mitigate the damage caused by attacks that get through the defenses.
Pirated Movies Are Used to Distribute Malware
In the case of the campaign discovered by Microsoft Security Intelligence, the malware planted by attackers consists of coin miners. These applications are using the power of the PCs to dig up cryptocurrencies. It could very well be some malware that steals credentials or that monitors the keyboard.